Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Miscellaneous Advertisment Re-directs in Mozilla Firefox


  • This topic is locked This topic is locked
20 replies to this topic

#1 xanatos_rendar

xanatos_rendar

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 24 February 2010 - 09:03 PM

I have been experiencing an annoying, though somewhat harmless, problem with mozilla firefox (on windows vista). When visiting previously secure sites (like Facebook, etc.) I will get varying ad re-directs. The advertisement pops up and takes the window giving me some offer an a change to "skip this ad". When I click on the skip button, it takes me back to the page that I was initially visiting. I have not experienced this problem while using IE. Mozilla also seems to be running very slowly, a problem that I have never had before and is not linked to computer preformance (other applications, including IE run just as fast as ever). The first thing I tried was general anti-virus/anti-spyware scan with ZoneAlarm. I followed that with scans by Spybot S&D, Ad-aware and Malwarebytes Anti-Malware. Some items were found, but the problem persisted. I also updated Firefox which has not seemed to help. Advice is greatly appreciated because I don't want to do much more online, lest the problem increase. Thank you and here is the DDS:


DDS (Ver_09-12-01.01) - NTFSx86
Run by JBIII at 11:57:34.67 on Tue 02/23/2010
Internet Explorer: 8.0.6001.18882 BrowserJavaVersion: 1.6.0_17
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3070.1074 [GMT -8:00]

AV: ZoneAlarm Security Suite Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
SP: ZoneAlarm Security Suite Anti-Spyware *enabled* (Updated) {F245A209-1085-48B4-B927-35D56015EC60}
SP: Spybot - Search and Destroy *enabled* (Updated) {ED588FAF-1B8F-43B4-ACA8-8E3C85DADBE9}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
FW: ZoneAlarm Security Suite Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\ZoneLabs\vsmon.exe
C:\Windows\system32\atieclxx.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\PROGRA~1\Intuit\QUICKB~1\QBDBMgrN.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\Explorer.EXE
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Windows\CNYHKey.exe
C:\Windows\ModLEDKey.exe
C:\Program Files\Acronis\TrueImageHome\TrueImageMonitor.exe
C:\Program Files\Acronis\TrueImageHome\TimounterMonitor.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\IOI\ButtonMonitor.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\mobsync.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Acronis\TrueImageHome\TrueImage.exe
C:\Program Files\Common Files\Acronis\TrueImage\TrueImageNotify.exe
C:\Program Files\Common Files\Acronis\TrueImage\TrueImageService.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\JBIII\Downloads\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - No File
BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter
uRun: [Aim6]
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [ledpointer] CNYHKey.exe
mRun: [MoLed] ModLEDKey.exe
mRun: [TrueImageMonitor.exe] c:\program files\acronis\trueimagehome\TrueImageMonitor.exe
mRun: [AcronisTimounterMonitor] c:\program files\acronis\trueimagehome\TimounterMonitor.exe
mRun: [Acronis Scheduler2 Service] "c:\program files\common files\acronis\schedule2\schedhlp.exe"
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [Skytel] Skytel.exe
mRun: [ButtonMonitor] c:\program files\ioi\ButtonMonitor.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [WinampAgent] "c:\program files\winamp\winampa.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~3\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
Trusted Zone: intuit.com\ttlc
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
LSA: Authentication Packages = msv1_0 relog_ap
Hosts: 127.0.0.1 www.spywareinfo.com

================= FIREFOX ===================

FF - ProfilePath - c:\users\jbiii\appdata\roaming\mozilla\firefox\profiles\tgeurumw.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.goodsearch.com/
FF - prefs.js: keyword.URL - hxxp://bing.zugotoolbar.com/s/?iesrc=IE-Address&site=Bing&q=
FF - component: c:\program files\mozilla firefox\extensions\{316ac9ac-5460-f61d-f284-f3b0b687e1bc}\components\MdxLVC_a0wPw-.dll
FF - plugin: c:\program files\gametap web player\bin\release\npGameTapWebPlayer.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll
FF - plugin: c:\users\jbiii\appdata\local\yahoo!\browserplus\2.4.21\plugins\npybrowserplus_2.4.21.dll
FF - plugin: c:\users\jbiii\appdata\roaming\mozilla\firefox\profiles\tgeurumw.default\extensions\{e2883e8f-472f-4fb0-9522-ac9bf37916a7}\plugins\np_gp.dll
FF - plugin: c:\users\jbiii\appdata\roaming\mozilla\firefox\profiles\tgeurumw.default\extensions\gametap@gametap.com\plugins\npGameTapWebUpdater.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: LoudMo Contextual Ad Assistant: No Registry Reference - c:\program files\mozilla firefox\extensions\{316ac9ac-5460-f61d-f284-f3b0b687e1bc}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: google.toolbar.linkdoctor.enabled - false
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-2-21 64288]
R2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2009-4-29 176128]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-2-4 1229232]
R2 SBSDWSCService;SBSD Security Center Service;c:\program files\spybot - search & destroy\SDWinSec.exe [2008-6-13 1153368]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2008-6-4 24652]
R3 rt61x86;RT61 Wireless Driver for Windows Vista;c:\windows\system32\drivers\netr61.sys [2008-11-26 333824]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
S3 NVHDA;Service for NVIDIA HDMI Audio Driver;c:\windows\system32\drivers\nvhda32v.sys [2008-5-26 36384]

=============== Created Last 30 ================

2010-02-21 18:23:18 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-21 10:29:14 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-21 10:29:12 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-02-21 10:27:30 0 dc-h--w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-21 10:27:25 0 d-----w- c:\program files\Lavasoft
2010-02-21 00:33:31 0 d-----w- c:\program files\TurboTax
2010-02-12 17:47:11 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2010-02-12 17:44:46 118284 ----a-w- c:\windows\system32\vB12_4L-p-.exe
2010-02-12 17:44:28 0 d-----w- c:\users\jbiii\appdata\roaming\DAEMON Tools Pro
2010-02-12 17:44:28 0 d-----w- c:\programdata\DAEMON Tools Pro
2010-02-12 17:44:14 0 d-----w- c:\program files\Search Toolbar
2010-02-10 08:03:17 0 d-----w- c:\programdata\FLEXnet
2010-02-10 07:38:57 0 d-----w- c:\program files\Windows Portable Devices
2010-02-10 07:38:52 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
2010-02-10 07:38:39 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
2010-02-10 07:36:53 555520 ----a-w- c:\windows\system32\UIAutomationCore.dll
2010-02-10 07:36:53 4096 ----a-w- c:\windows\system32\oleaccrc.dll
2010-02-10 07:36:53 234496 ----a-w- c:\windows\system32\oleacc.dll
2010-02-10 07:36:02 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
2010-02-10 07:36:01 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
2010-02-10 07:35:48 310784 ----a-w- c:\windows\system32\unregmp2.exe
2010-02-10 07:35:47 8147456 ----a-w- c:\windows\system32\wmploc.DLL
2010-02-10 07:35:36 714240 ----a-w- c:\windows\system32\timedate.cpl
2010-02-09 19:21:16 24064 ------w- c:\windows\system32\msxml3a.dll
2010-02-09 19:20:35 0 d-----w- c:\programdata\Ahead
2010-02-09 18:33:12 0 d-----w- c:\programdata\CyberLink
2010-02-09 09:20:42 0 d-----w- c:\windows\pss
2010-02-09 07:48:41 0 d-----w- c:\programdata\Rosetta Stone
2010-02-09 07:48:41 0 d-----w- c:\program files\Rosetta Stone
2010-02-09 07:37:58 0 d-----w- c:\program files\common files\Macrovision Shared
2010-02-01 03:06:13 0 d-----w- c:\users\jbiii\appdata\roaming\Hasbro
2010-02-01 03:06:13 0 d-----w- c:\program files\Trivial Pursuit Choice
2010-01-29 20:12:24 1273856 ----a-w- c:\windows\system32\p-KFj3Z1v1C85.dll

==================== Find3M ====================

2010-02-10 07:38:54 86016 ----a-w- c:\windows\inf\infstor.dat
2010-02-10 07:38:54 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-02-10 07:38:54 51200 ----a-w- c:\windows\inf\infpub.dat
2010-02-10 07:38:54 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-01-14 19:12:06 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-01-11 00:16:42 37665 ----a-w- c:\windows\fonts\GlobalUserInterface.CompositeFont
2010-01-08 00:07:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-08 00:07:04 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-02 06:38:20 916480 ----a-w- c:\windows\system32\wininet.dll
2010-01-02 06:32:33 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-01-02 06:32:33 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-01-02 04:57:00 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2009-12-08 20:01:02 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-12-08 20:01:02 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-04 18:30:05 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2009-12-04 18:29:41 1314816 ----a-w- c:\windows\system32\quartz.dll
2009-12-04 18:28:52 22528 ----a-w- c:\windows\system32\msyuv.dll
2009-12-04 18:28:51 31744 ----a-w- c:\windows\system32\msvidc32.dll
2009-12-04 18:28:51 123904 ----a-w- c:\windows\system32\msvfw32.dll
2009-12-04 18:28:49 13312 ----a-w- c:\windows\system32\msrle32.dll
2009-12-04 18:28:27 82944 ----a-w- c:\windows\system32\mciavi32.dll
2009-12-04 18:28:21 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2009-12-04 18:27:12 91136 ----a-w- c:\windows\system32\avifil32.dll
2008-01-21 02:43:21 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2008-10-17 22:00:58 16384 --sha-w- c:\windows\temp\cookies\index.dat
2008-10-17 22:00:58 16384 --sha-w- c:\windows\temp\history\history.ie5\index.dat
2008-10-17 22:00:58 32768 --sha-w- c:\windows\temp\temporary internet files\content.ie5\index.dat

============= FINISH: 11:58:57.63 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 26 February 2010 - 10:24 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 27 February 2010 - 01:03 AM

m0le,
Thank you for your help. I look forward to working with you. I haven't updated or installed anything (that I'm aware of) since the initial scans that you can see. Again, thank you for your help.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 27 February 2010 - 05:59 AM

Can you post the MBAM log which shows what it has already tackled.

Open MBAM and click the Logs tab to copy and paste the log here.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 27 February 2010 - 05:11 PM

I have several MBAM logs, but here are the two most recent.
Februrary 21, 2010:
Malwarebytes' Anti-Malware 1.44
Database version: 3772
Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18882

2/21/2010 8:02:01 PM
mbam-log-2010-02-21 (20-02-01).txt

Scan type: Full Scan (C:\|D:\|E:\|G:\|H:\|I:\|J:\|)
Objects scanned: 710954
Time elapsed: 2 hour(s), 20 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{fe5b2d9d-91b0-b04b-ac20-14a260769687} (Adware.ColorSoft) -> Not selected for removal.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\vb12_4l-p- (Adware.AdRotator) -> Not selected for removal.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Windows\System32\vB12_4L-p-.exe (Adware.AdRotator) -> Not selected for removal.

Februray 19, 2010:
Malwarebytes' Anti-Malware 1.44
Database version: 3581
Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18882

2/19/2010 1:10:39 AM
mbam-log-2010-02-19 (01-10-39).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 707028
Time elapsed: 2 hour(s), 8 minute(s), 59 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 27 February 2010 - 06:48 PM

The 2/19/10 log shows nothing but the 2/21/10 log shows some adware which MBAM did not remove.

Please run MBAM on full scan again but make sure that everything is checked, and click Remove Selected


Then please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks smile.gif

Posted Image
m0le is a proud member of UNITE

#7 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 28 February 2010 - 12:00 AM

I attempted to shut everything down, but ComboFix said that ZoneAlarm was still running. It ran during a boot-up sequence, however. Here is the log:
ComboFix 10-02-27.04 - JBIII 02/27/2010 20:35:28.1.4 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3070.2345 [GMT -8:00]
Running from: c:\users\JBIII\Desktop\ComFix.exe
AV: ZoneAlarm Security Suite Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Security Suite Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
SP: Spybot - Search and Destroy *disabled* (Outdated) {ED588FAF-1B8F-43B4-ACA8-8E3C85DADBE9}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
SP: ZoneAlarm Security Suite Anti-Spyware *enabled* (Updated) {F245A209-1085-48B4-B927-35D56015EC60}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\bszip.dll
c:\windows\system32\drivers\etc\lmhosts
D:\Autorun.inf

.
((((((((((((((((((((((((( Files Created from 2010-01-28 to 2010-02-28 )))))))))))))))))))))))))))))))
.

2010-02-28 04:43 . 2010-02-28 04:44 -------- d-----w- c:\users\JBIII\AppData\Local\temp
2010-02-23 21:23 . 2010-01-23 09:26 2048 ----a-w- c:\windows\system32\tzres.dll
2010-02-21 18:23 . 2010-02-21 10:29 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-21 10:29 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-21 10:29 . 2010-02-21 10:29 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-02-21 10:29 . 2010-02-21 10:29 95024 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\Drivers\SBREDrv.sys
2010-02-21 10:29 . 2010-02-21 10:29 598368 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\EmailScanner.dll
2010-02-21 10:29 . 2010-02-21 10:29 884176 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\threatwork.exe
2010-02-21 10:29 . 2010-02-21 10:29 566608 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\sbap.dll
2010-02-21 10:29 . 2010-02-21 10:29 211064 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\lavamessage.dll
2010-02-21 10:29 . 2010-02-21 10:29 15880 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\lsdelete.exe
2010-02-21 10:29 . 2010-02-21 10:29 393896 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\lavalicense.dll
2010-02-21 10:29 . 2010-02-21 10:29 562272 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\aawapi.dll
2010-02-21 10:29 . 2010-02-21 10:29 221408 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\VipreBridge.dll
2010-02-21 10:27 . 2010-02-21 10:27 -------- dc-h--w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-21 10:27 . 2010-02-04 15:53 2954656 -c--a-w- c:\programdata\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
2010-02-21 10:27 . 2010-02-21 10:27 -------- d-----w- c:\program files\Lavasoft
2010-02-21 00:33 . 2010-02-21 00:33 -------- d-----w- c:\users\JBIII\AppData\Local\IsolatedStorage
2010-02-21 00:33 . 2010-02-21 00:33 -------- d-----w- c:\program files\TurboTax
2010-02-12 17:47 . 2010-02-12 17:47 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2010-02-12 17:44 . 2010-02-12 17:54 -------- d-----w- c:\users\JBIII\AppData\Roaming\DAEMON Tools Pro
2010-02-12 17:44 . 2010-02-12 17:45 -------- d-----w- c:\programdata\DAEMON Tools Pro
2010-02-12 17:44 . 2010-02-12 17:44 84480 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\components\Engine.dll
2010-02-12 17:44 . 2010-02-12 17:44 56832 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\chrome\content\id_searchtoolbar\update.exe
2010-02-12 17:44 . 2010-02-12 17:44 42496 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\chrome\content\id_searchtoolbar\uninstall.exe
2010-02-12 17:44 . 2010-02-12 17:44 41984 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\chrome\content\id_searchtoolbar\SearchToolbar.dll
2010-02-12 17:44 . 2010-02-12 17:44 301568 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\chrome\content\id_searchtoolbar\tbhelper.dll
2010-02-12 17:44 . 2010-02-12 17:44 2767360 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\chrome\content\id_searchtoolbar\tbcore3.dll
2010-02-12 17:44 . 2010-02-12 17:44 152664 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{896642E4-C556-4ED3-85D1-9AC431603E7D}\components\setup_widget_serv.exe
2010-02-12 17:44 . 2010-02-12 17:44 -------- d-----w- c:\program files\Search Toolbar
2010-02-10 08:03 . 2010-02-10 08:03 -------- d-----w- c:\programdata\FLEXnet
2010-02-10 07:38 . 2010-02-10 07:38 -------- d-----w- c:\program files\Windows Portable Devices
2010-02-10 07:36 . 2009-10-08 21:08 555520 ----a-w- c:\windows\system32\UIAutomationCore.dll
2010-02-10 07:36 . 2009-10-08 21:08 234496 ----a-w- c:\windows\system32\oleacc.dll
2010-02-10 07:36 . 2009-10-08 21:07 4096 ----a-w- c:\windows\system32\oleaccrc.dll
2010-02-10 07:36 . 2009-08-29 00:14 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
2010-02-10 07:36 . 2009-08-29 00:27 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
2010-02-10 07:35 . 2009-09-10 14:58 310784 ----a-w- c:\windows\system32\unregmp2.exe
2010-02-10 07:35 . 2009-09-10 14:59 8147456 ----a-w- c:\windows\system32\wmploc.DLL
2010-02-09 19:25 . 2010-02-09 19:25 -------- d-----w- c:\program files\Common Files\Nero
2010-02-09 19:21 . 2001-03-09 02:30 24064 ------w- c:\windows\system32\msxml3a.dll
2010-02-09 19:20 . 2010-02-09 19:20 -------- d-----w- c:\programdata\Ahead
2010-02-09 19:20 . 2010-02-10 07:45 -------- d-----w- c:\program files\Ahead
2010-02-09 18:33 . 2010-02-09 18:38 -------- d-----w- c:\programdata\CyberLink
2010-02-09 18:33 . 2010-02-09 18:33 -------- d-----w- c:\users\Public\CyberLink
2010-02-09 18:33 . 2010-02-09 18:33 -------- d-----w- c:\users\JBIII\AppData\Roaming\CyberLink
2010-02-09 07:48 . 2010-02-25 09:00 -------- d-----w- c:\programdata\Rosetta Stone
2010-02-09 07:48 . 2010-02-09 07:48 -------- d-----w- c:\program files\Rosetta Stone
2010-02-09 07:37 . 2010-02-09 07:37 -------- d-----w- c:\program files\Common Files\Macrovision Shared
2010-02-01 03:06 . 2010-02-01 03:06 -------- d-----w- c:\users\JBIII\AppData\Roaming\Hasbro
2010-02-01 03:06 . 2010-02-01 03:06 -------- d-----w- c:\program files\Trivial Pursuit Choice
2010-01-29 20:12 . 2010-01-29 20:12 1273856 ----a-w- c:\windows\system32\p-KFj3Z1v1C85.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-28 04:01 . 2010-02-28 04:25 8704 ----a-w- c:\windows\Internet Logs\xDB13EF.tmp
2010-02-28 03:59 . 2010-02-28 04:01 649728 ----a-w- c:\windows\Internet Logs\xDB8B4F.tmp
2010-02-26 17:02 . 2008-12-09 01:51 105287808 ----a-w- c:\windows\Internet Logs\tvDebug.Zip
2010-02-25 06:35 . 2009-12-21 17:16 -------- d-----w- c:\programdata\NOS
2010-02-23 21:21 . 2008-08-15 05:41 1 ----a-w- c:\users\JBIII\AppData\Roaming\OpenOffice.org2\user\uno_packages\cache\stamp.sys
2010-02-23 21:21 . 2008-08-15 05:31 -------- d-----w- c:\users\JBIII\AppData\Roaming\OpenOffice.org2
2010-02-23 21:16 . 2010-02-23 21:19 2314240 ----a-w- c:\windows\Internet Logs\xDBFA29.tmp
2010-02-23 21:16 . 2010-02-23 21:19 1986048 ----a-w- c:\windows\Internet Logs\xDBF75A.tmp
2010-02-21 10:29 . 2010-02-21 10:28 390320 ----a-w- c:\programdata\Lavasoft\Ad-Aware\update\UpdateManager.dll
2010-02-21 09:42 . 2008-06-14 04:28 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-02-21 09:38 . 2008-06-14 04:28 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2010-02-21 00:37 . 2008-06-21 21:37 -------- d-----w- c:\users\JBIII\AppData\Roaming\Intuit
2010-02-21 00:34 . 2008-06-21 21:36 -------- d-----w- c:\programdata\Intuit
2010-02-21 00:33 . 2008-06-21 21:37 -------- d-----w- c:\program files\Common Files\Intuit
2010-02-18 19:35 . 2009-03-20 07:28 -------- d-----w- c:\users\JBIII\AppData\Roaming\Azureus
2010-02-16 22:49 . 2010-02-18 02:43 8704 ----a-w- c:\windows\Internet Logs\xDB8CB7.tmp
2010-02-16 22:47 . 2010-02-16 22:49 2836992 ----a-w- c:\windows\Internet Logs\xDB8825.tmp
2010-02-12 09:43 . 2009-03-20 07:27 -------- d-----w- c:\program files\Vuze
2010-02-12 09:43 . 2009-07-08 17:21 175 ----a-w- c:\users\JBIII\AppData\Roaming\Azureus\restart.bat
2010-02-10 07:38 . 2006-11-02 10:25 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-02-10 07:38 . 2010-02-10 07:38 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
2010-02-10 07:38 . 2010-02-10 07:38 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
2010-01-31 00:11 . 2009-01-17 02:58 -------- d-----w- c:\users\JBIII\AppData\Roaming\Apple Computer
2010-01-22 00:43 . 2009-10-20 04:59 -------- d-----w- c:\users\JBIII\AppData\Roaming\Canon
2010-01-17 05:41 . 2010-01-17 05:41 -------- d-----w- c:\users\JBIII\AppData\Roaming\Malwarebytes
2010-01-17 05:41 . 2010-01-17 05:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-03 02:25 . 2008-05-25 08:46 -------- d-----w- c:\program files\Java
2010-01-02 06:38 . 2010-01-21 19:18 916480 ----a-w- c:\windows\system32\wininet.dll
2010-01-02 06:32 . 2010-01-21 19:18 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-01-02 06:32 . 2010-01-21 19:18 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-01-02 04:57 . 2010-01-21 19:18 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2009-12-24 22:45 . 2009-12-24 22:45 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
2009-12-11 11:43 . 2010-02-10 08:18 302080 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-11 11:43 . 2010-02-10 08:18 98816 ----a-w- c:\windows\system32\drivers\srvnet.sys
2009-12-10 19:04 . 2009-12-21 17:16 31936 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\plugins\np_gp.dll
2009-12-10 19:04 . 2009-12-21 17:16 29344 ----a-w- c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\chrome\content\getPlusPlus_Adobe_reg.exe
2009-12-10 11:18 . 2009-12-10 11:20 1879040 ----a-w- c:\windows\Internet Logs\xDBEDBF.tmp
2009-12-10 11:18 . 2009-12-10 11:20 12940288 ----a-w- c:\windows\Internet Logs\xDBEBF6.tmp
2009-12-08 20:01 . 2010-02-10 08:18 904776 ----a-w- c:\windows\system32\drivers\tcpip.sys
2009-12-08 20:01 . 2010-02-10 08:18 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-12-08 20:01 . 2010-02-10 08:18 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-08 17:26 . 2010-02-10 08:18 30720 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2009-12-04 18:30 . 2010-02-10 08:18 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2009-12-04 18:29 . 2010-02-10 08:18 1314816 ----a-w- c:\windows\system32\quartz.dll
2009-12-04 18:28 . 2010-02-10 08:18 22528 ----a-w- c:\windows\system32\msyuv.dll
2009-12-04 18:28 . 2010-02-10 08:18 31744 ----a-w- c:\windows\system32\msvidc32.dll
2009-12-04 18:28 . 2010-02-10 08:18 123904 ----a-w- c:\windows\system32\msvfw32.dll
2009-12-04 18:28 . 2010-02-10 08:18 13312 ----a-w- c:\windows\system32\msrle32.dll
2009-12-04 18:28 . 2010-02-10 08:18 82944 ----a-w- c:\windows\system32\mciavi32.dll
2009-12-04 18:28 . 2010-02-10 08:18 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2009-12-04 18:27 . 2010-02-10 08:18 91136 ----a-w- c:\windows\system32\avifil32.dll
2009-12-04 15:56 . 2010-02-10 08:18 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2009-12-04 15:56 . 2010-02-10 08:18 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WindowsWelcomeCenter"="oobefldr.dll" [2009-04-11 2153472]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-21 1008184]
"ledpointer"="CNYHKey.exe" [2006-11-09 5585408]
"MoLed"="ModLEDKey.exe" [2006-11-09 53248]
"TrueImageMonitor.exe"="c:\program files\Acronis\TrueImageHome\TrueImageMonitor.exe" [2006-10-17 1164912]
"AcronisTimounterMonitor"="c:\program files\Acronis\TrueImageHome\TimounterMonitor.exe" [2006-10-17 1941784]
"Acronis Scheduler2 Service"="c:\program files\Common Files\Acronis\Schedule2\schedhlp.exe" [2006-10-17 87584]
"RtHDVCpl"="RtHDVCpl.exe" [2007-11-23 4706304]
"Skytel"="Skytel.exe" [2007-11-21 1826816]
"ButtonMonitor"="c:\program files\IOI\ButtonMonitor.exe" [2007-05-11 53248]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-10-17 1037192]
"WinampAgent"="c:\program files\Winamp\winampa.exe" [2009-07-01 37888]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-10-11 149280]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2010-01-08 1394000]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^QuickBooks Update Agent.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\QuickBooks Update Agent.lnk
backup=c:\windows\pss\QuickBooks Update Agent.lnk.CommonStartup
backupExtension=.CommonStartup

[HKLM\~\startupfolder\C:^Users^JBIII^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^RollerCoaster Tycoon 3 Registration.lnk]
path=c:\users\JBIII\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RollerCoaster Tycoon 3 Registration.lnk
backup=c:\windows\pss\RollerCoaster Tycoon 3 Registration.lnk.Startup
backupExtension=.Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NapsterShell]
2006-09-06 19:12 323216 ----a-w- c:\program files\Napster\napster.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-09-05 08:54 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:1f,fa,9c,88,54,92,ca,01

R0 Lbd;Lbd;c:\windows\System32\drivers\Lbd.sys [2/21/2010 2:29 AM 64288]
R2 AMD External Events Utility;AMD External Events Utility;c:\windows\System32\atiesrxx.exe [4/29/2009 1:07 AM 176128]
R2 SBSDWSCService;SBSD Security Center Service;c:\program files\Spybot - Search & Destroy\SDWinSec.exe [6/13/2008 8:28 PM 1153368]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [6/4/2008 11:28 PM 24652]
R3 rt61x86;RT61 Wireless Driver for Windows Vista;c:\windows\System32\drivers\netr61.sys [11/26/2008 12:51 PM 333824]
S0 sptd;sptd;c:\windows\System32\drivers\sptd.sys [2/12/2010 9:47 AM 691696]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/4/2010 7:52 AM 1229232]
S3 NVHDA;Service for NVIDIA HDMI Audio Driver;c:\windows\System32\drivers\nvhda32v.sys [5/26/2008 10:53 AM 36384]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder

2010-02-28 c:\windows\Tasks\User_Feed_Synchronization-{6B2C57F0-FDC6-4600-AABF-7859AB5567BA}.job
- c:\windows\system32\msfeedssync.exe [2010-01-21 04:56]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: intuit.com\ttlc
FF - ProfilePath - c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.goodsearch.com/
FF - prefs.js: keyword.URL - hxxp://bing.zugotoolbar.com/s/?iesrc=IE-Address&site=Bing&q=
FF - component: c:\program files\Mozilla Firefox\extensions\{316ac9ac-5460-f61d-f284-f3b0b687e1bc}\components\MdxLVC_a0wPw-.dll
FF - plugin: c:\program files\GameTap Web Player\bin\release\npGameTapWebPlayer.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npViewpoint.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Media Player\npViewpoint.dll
FF - plugin: c:\users\JBIII\AppData\Local\Yahoo!\BrowserPlus\2.4.21\Plugins\npybrowserplus_2.4.21.dll
FF - plugin: c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\plugins\np_gp.dll
FF - plugin: c:\users\JBIII\AppData\Roaming\Mozilla\Firefox\Profiles\tgeurumw.default\extensions\GameTap@gametap.com\plugins\npGameTapWebUpdater.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Aim6 - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-27 20:44
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(892)
c:\windows\system32\relog_ap.dll
.
Completion time: 2010-02-27 20:48:05
ComboFix-quarantined-files.txt 2010-02-28 04:48

Pre-Run: 454,900,482,048 bytes free
Post-Run: 455,092,224,000 bytes free

- - End Of File - - A319EFACBDF92FD3A473D49A1741624D


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 28 February 2010 - 05:26 AM

The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case Azureus). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. Some further readings on this subject, along the included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

It is also important to note that sharing entertainment files and proprietary software infringes the copyright laws in many countries over the world and you are putting yourself at risk of being indicted through organisations watching over the rights of the authors of such files (i.e. the RIAA for music files, or the MPAA for movie files in the USA) or the authors of the files themselves.

Naturally there are also legal ways to use these services, such as downloading Linux distributions or office suites such as "Open Office."


Now let's check a file, it looks suspicious.

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Go to Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

c:\windows\system32\p-KFj3Z1v1C85.dll

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at VirusTotal

Thanks smile.gif
Posted Image
m0le is a proud member of UNITE

#9 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 28 February 2010 - 05:05 PM

I am usually very safe with Azureus, only getting clean (I virus and spyware check them when I download them) and legally free files. Here is the Jotti scan:

Jotti's malware scan
Filename: p-KFj3Z1v1C85.dll
Status: Scan finished. 2 out of 20 scanners reported malware.
Scan taken on: Sun 28 Feb 2010 23:02:06 (CET) Permalink



--------------------------------------------------------------------------------
Additional info
File size: 1273856 bytes
Filetype: PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit
MD5: 701d9a11f30e3a9a730d1c8c08a1f218
SHA1: f4e8a6f4d596cacec3f4793f6943368cc9975ca4







Scanners
2010-02-23 Found nothing 2010-02-28 Found nothing
2010-02-23 Riskware.AdWare.Win32.EZula!IK 2010-02-23 Found nothing
2010-02-23 Found nothing 2010-02-23 not-a-virus:AdWare.Win32.EZula
2010-02-28 Found nothing 2010-02-23 Found nothing
2010-02-23 Found nothing 2010-02-23 Found nothing
2010-02-23 Found nothing 2010-02-22 Found nothing
2010-02-28 Found nothing 2010-02-23 Found nothing
2010-02-23 Found nothing 2010-02-28 Found nothing
2010-02-28 Found nothing 2010-02-22 Found nothing
2010-02-22 Found nothing 2010-02-22 Found nothing



--------------------------------------------------------------------------------



Scan a file - Hash search - Frequently Asked Questions - Privacy policy

© 2004-2010 Jotti <jotti@jotti.org>





#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 28 February 2010 - 05:21 PM

QUOTE
I am usually very safe with Azureus, only getting clean (I virus and spyware check them when I download them) and legally free files


New infections spread like wildfire on P2P sites because the authors know that a lot of people use them and so they plant their creations there. The new infections slide under the virus radar. Before they get analysed and they update their signatures on their antimalware programs they are unstoppable. Then before you know it it's all over the web on forums like these.

Let's remove this file we just checked.


Use Windows Explorer to find and delete this file:

c:\windows\system32\p-KFj3Z1v1C85.dll

As an example:
To delete C:\WINDOWS\badfile.dll
Double click the My Computer icon on your Desktop. Or click on the Windows KEY + E.
Double click on Local Disc (C:\)
Double click on the Windows folder,
Right click on badfile.dll and then from the menu that appears, click on Delete


If it won't go then post back and we'll remove it more forcefully.
Posted Image
m0le is a proud member of UNITE

#11 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 28 February 2010 - 06:05 PM

File was deleted. Should I remove it from the recycle bin? What's the next step? Or do you think that was the root of the problem?

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 28 February 2010 - 06:16 PM

No, that was a file that was left after the war. smile.gif

Lets scan for remnants

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

Posted Image
m0le is a proud member of UNITE

#13 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 28 February 2010 - 06:27 PM

On the ESETscan, should I leave the "Remove Found Threats" box checked (above "Scan Archives")?

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:02 PM

Posted 28 February 2010 - 07:32 PM

Yes smile.gif
Posted Image
m0le is a proud member of UNITE

#15 xanatos_rendar

xanatos_rendar
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:02 PM

Posted 01 March 2010 - 02:44 AM

The scan finished and found nothing. I could not find the "export to text file" button.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users