Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan Virus Detected and Quarantined (Virus name:Trojan.Win32.Tdss.axqv)


  • This topic is locked This topic is locked
15 replies to this topic

#1 phoenix85

phoenix85

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 15 March 2010 - 04:51 PM

Referred from here: http://www.bleepingcomputer.com/forums/t/302497/help-needed-trojan-virus-detected/ ~ OB

Hello,

I visited a website two days ago and downloaded an .exe file. When i clicked on the link, the file disappeared and Rogers Online Protection(in Canada by Rogers Communications) notified me of a trojan virus intrusion that was quarantined. I had it deleted in the middle of a full system scanning process while I was online with my infected laptop

Tried to run malwarebytes and couldn't update the software.I noticed that although I couldn't access malwarebytes.org, I could run some other websites which told me that the virus was still present in my system. I had started to receive random popups and disconnected my laptop. Please note that I have not gone online from my laptop ever since. I am presently using a clean computer to communicate as well as download installers/updates from this forum.

Another thing to be noted is that I downloaded installers for DDS, Defogger and GMER on my clean computer and transferred to my infected laptop using a USB flash drive. I assume this is a safe procedure as I don't want to risk going online with my infected laptop. I have scanned my usb drive for viruses using Kaspersky Anti- Virus(6.0.2.690) on my clean computer and no threats were detected. I have reformatted the usb drive just to be sure.

Have been following instructions outlined by boopme from Am I infected? What do I do? forum so far and did not face any problems running the applications(ATF and SUPER) on my laptop.

Now for some concerns-:

1)I have noticed some strange folders like for example...
a) C:\Documents and Settings\All Users\JohnC which I did not create and is still present.
cool.gif Suspicious looking text file with strange characters in C:\Temp\1cb\syscheck.txt

There might be as well other infected folders on my system and would like help identifying and deleting these infected folders.

2) I have disk partition on my system( C and D) and the virus seems to have affected only the C drive. Could it have affected the D drive?

3)This might sound silly but I have somef Word documents, e-books and mp3s(that I am created/downloaded) in C:\ drive. Are these virus safe and can I transfer them to a blank DVD?

Going to the technical stuff..I am posting the requested DDS log and have made attachments...

Just a note here.. I didn't any disable scipt-blocking programs( I am not sure how!). Did not receive any
warnings stating any interference of script-blocking programs). I am guessing this process didn't go well. unsure.gif



DDS (Ver_09-12-01.01) - FAT32x86
Run by Twinkle at 16:33:34.78 on 15/03/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_18
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.141 [GMT -4:00]

AV: Rogers Online Protection Anti-Virus *On-access scanning enabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755}
AV: Norton Security Online *On-access scanning disabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Rogers Online Protection Firewall *enabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22}
FW: Norton Security Online *enabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
SVCHOST.EXE
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\Program Files\Rogers Online Protection\Rogers Online Protection\Fws.exe
SVCHOST.EXE
C:\WINDOWS\system32\spoolsv.exe
SVCHOST.EXE
C:\Acer\eManager\anbmServ.exe
SVCHOST.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Rogers Online Protection\Rogers Online Protection\rps.exe
C:\Program Files\Rogers Online Protection\Rogers Online Protection\RpsSecurityAwareR.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Acer\eRecovery\Monitor.exe
C:\acer\epm\epm-dm.exe
C:\PROGRA~1\LAUNCH~1\QtZgAcer.EXE
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Rogers Online Protection\Rogers Servicepoint Agent\RogersServicepointAgent.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\Brmfcmon\BrMfcWnd.exe
C:\Program Files\Brother\ControlCenter3\brccMCtl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Veoh Networks\VeohWebPlayer\veohwebplayer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Brother\Brmfcmon\BrMfcmon.exe
C:\Documents and Settings\Twinkle\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://global.acer.com
uInternet Connection Wizard,ShellNext = hxxp://global.acer.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: PopKill Class: {3c060ea2-e6a9-4e49-a530-d4657b8c449a} - c:\program files\rogers online protection\rogers online protection\pkR.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Veoh Browser Plug-in: {d0943516-5076-4020-a3b5-aefaf26ab263} - c:\program files\veoh networks\veoh\plugins\reg\VeohToolbar.dll
TB: Veoh Web Player Video Finder: {0fbb9689-d3d7-4f7a-a2e2-585b10099bfc} - c:\program files\veoh networks\veohwebplayer\VeohIEToolbar.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: []
uRun: [VeohPlugin] "c:\program files\veoh networks\veohwebplayer\veohwebplayer.exe"
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [LaunchApp] Alaunch
mRun: [High Definition Audio Property Page Shortcut] HDAShCut.exe
mRun: [AzMixerSel] c:\program files\realtek\installshield\AzMixerSel.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [EPM-DM] c:\acer\epm\epm-dm.exe
mRun: [ePowerManagement] c:\acer\epm\ePM.exe boot
mRun: [LManager] c:\progra~1\launch~1\QtZgAcer.EXE
mRun: [eRecoveryService] c:\program files\acer\erecovery\Monitor.exe
mRun: [StormCodec_Helper] "c:\program files\ringz studio\storm codec\StormSet.exe" /S /opti
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [RogersServicepointAgent.exe] "c:\program files\rogers online protection\rogers servicepoint agent\RogersServicepointAgent.exe" /AUTORUN
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [SSBkgdUpdate] "c:\program files\common files\scansoft shared\ssbkgdupdate\SSBkgdupdate.exe" -Embedding -boot
mRun: [PaperPort PTD] "c:\program files\scansoft\paperport\pptd40nt.exe"
mRun: [IndexSearch] "c:\program files\scansoft\paperport\IndexSearch.exe"
mRun: [PPort11reminder] "c:\program files\scansoft\paperport\ereg\ereg.exe" -r "c:\documents and settings\all users\application data\scansoft\paperport\11\config\ereg\Ereg.ini"
mRun: [BrMfcWnd] c:\program files\brother\brmfcmon\BrMfcWnd.exe /AUTORUN
mRun: [ControlCenter3] c:\program files\brother\controlcenter3\brctrcen.exe /autorun
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [DiamondView] "c:\program files\manulife financial\diamond view\Diamondview.exe" /background
StartupFolder: c:\docume~1\twinkle\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Trusted Zone: microsoft.com\update
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1226749251796
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\twinkle\applic~1\mozilla\firefox\profiles\4jojj6fd.default\
FF - plugin: c:\program files\rogers online protection\rogers servicepoint agent\nprpspa.dll
FF - plugin: c:\program files\veoh networks\veoh\plugins\noreg\NPVeohVersion.dll
FF - plugin: c:\program files\veoh networks\veohwebplayer\NPVeohTVPlugin.dll
FF - plugin: c:\program files\veoh networks\veohwebplayer\npWebPlayerVideoPluginATL.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 KL1;KL1;c:\windows\system32\drivers\kl1.sys [2009-5-27 112144]
R1 KLIF;KLIF;c:\windows\system32\drivers\klif.sys [2009-5-27 196368]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-2-17 66632]
R3 Radialpoint Security Services;Rogers Online Protection;c:\program files\rogers online protection\rogers online protection\RpsSecurityAwareR.exe [2009-2-27 97520]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-2-17 12872]
S3 cpudrv;cpudrv;\??\c:\program files\systemrequirementslab\cpudrv.sys --> c:\program files\systemrequirementslab\cpudrv.sys [?]

=============== Created Last 30 ================

2010-03-15 20:31:39 0 ----a-w- c:\documents and settings\twinkle\defogger_reenable
2010-03-15 02:48:04 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-03-15 02:47:20 0 d-----w- c:\program files\SUPERAntiSpyware
2010-03-15 02:47:20 0 d-----w- c:\docume~1\twinkle\applic~1\SUPERAntiSpyware.com
2010-03-14 15:56:19 0 d-----w- c:\windows\pss
2010-03-14 13:43:04 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-14 13:42:42 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-14 13:42:36 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-13 21:29:56 0 d--h--w- c:\windows\PIF
2010-03-12 01:02:27 0 d-----w- c:\program files\common files\EZB Systems
2010-03-12 01:02:25 0 d-----w- c:\program files\UltraISO
2010-03-11 14:09:46 0 d-----w- c:\documents and settings\twinkle\WINDOWS
2010-03-11 14:05:21 0 d-----w- c:\program files\MagicISO
2010-03-10 05:24:55 3558912 ------w- c:\windows\system32\dllcache\moviemk.exe

==================== Find3M ====================

2010-03-15 08:43:58 32 --sha-w- c:\windows\system32\drivers\fidbox2.idx
2010-03-15 08:43:58 32 --sha-w- c:\windows\system32\drivers\fidbox2.dat
2010-03-15 08:43:58 32 --sha-w- c:\windows\system32\drivers\fidbox.idx
2010-03-15 08:43:58 32 --sha-w- c:\windows\system32\drivers\fidbox.dat
2009-12-31 15:50:04 353792 ------w- c:\windows\system32\dllcache\srv.sys
2009-12-21 12:19:18 173056 ----a-w- c:\windows\system32\dllcache\ie4uinit.exe
2009-12-17 21:14:00 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-16 17:43:28 343040 ----a-w- c:\windows\system32\mspaint.exe
2009-12-16 17:43:28 343040 ------w- c:\windows\system32\dllcache\mspaint.exe
2008-10-28 00:57:34 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008102720081028\index.dat
2009-10-16 18:25:58 245760 --sha-w- c:\windows\system32\config\systemprofile\ietldcache\index.dat

============= FINISH: 16:34:37.06 ===============

Attached Files


Edited by Orange Blossom, 15 March 2010 - 07:14 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 19 March 2010 - 04:39 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 19 March 2010 - 05:42 PM

Hi mOle,

This is to let you know I am still active.
Can't wait to get my laptop working normally again...

I understand you guys are really busy. Have subscribed to this topic.
Thanks in advance.

Edit: I should let you know that I changed my 'administrator' password from my user account (w/ admin privileges)
to gain access in safe mode.

Edited by phoenix85, 19 March 2010 - 06:00 PM.


#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 19 March 2010 - 08:01 PM

The tdss.axqv headline tells me all I need to about this infection on your PC.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 20 March 2010 - 01:17 PM

Hi mole,

Just a quick question..

Should I run combofix in safe mode(administrator) or is it okay to run it in my user account(admin privileges)?

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 20 March 2010 - 01:35 PM

Run it in your user account. Safe Mode is the very last resort smile.gif
Posted Image
m0le is a proud member of UNITE

#7 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 21 March 2010 - 12:16 AM

Hello again..

Ran ComboFix from user account without any hassles. Please note that I changed the filename to mortalkombat.exe.

I am attaching the combofix.txt below.

Thanks.


Edit: I restarted my computer and found an unknown folder named JohnC( Refer Post#1) under C:\Documents and Settings\
It had folders-: Application Data, Cookies, Favorites, Local settings and Templates that contained some excel, Powerpoint , Word documents and some other unrecognized files.

How do I get rid of these and other similar anonymous folders? Is it alright to simple delete these ?
Did Combofix clean up the registry?

Attached Files


Edited by phoenix85, 21 March 2010 - 12:56 AM.


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 21 March 2010 - 04:48 PM

MortalKombat was the Combofix's author's second choice for a name tongue.gif

If you don't recognise or want the JohnC folder then you can manually delete it. If it doesn't want to go then run Unlocker as below

Download and install Unlocker

Navigate to the file/folder you need to remove

Then right click and select Unlocker. If this deletes it then you are done. If it is locked then a list will apppear. Just click Unlock All.


The log looks good so let's move to the next steps

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then run the ESET online scan

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 22 March 2010 - 12:10 AM

Hi there mate,

I ran MalwareBytes and ESETOnlineScanner just fine. However, I've got some more bad news.
My online protection software( Anti-Virus, Anti-Spy and Firewall) detected another virus while I was offline.

C:\System Volume Information\_restore{38B4D61C-C07A-4C02-96D0-58C678D49ACB}\RP247\A0061651.exe
Packed.Win32.Krap.as
Quarantined
21/03/2010 8:51:19 PM


I am unsure about deleting this file as I assume this is related to system restore application.
So I would like your confirmation in deleting this file since this could be a false positive.
It's worrying to know that this virus wasn't picked in previous scans( MalwareBytes, SuperAnti-Spyware, ATFCleaner and ComboFix).
Looks like this is a stealthy virus and is still at large.

I am posting the requested logs:-

Malwarebytes' Anti-Malware 1.44
Database version: 3896
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

21/03/2010 8:56:16 PM
mbam-log-2010-03-21 (20-56-16).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 198813
Time elapsed: 59 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\protect_ie (Backdoor.Celofot) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


ESETScan log

C:\Documents and Settings\Twinkle\Application Data\Sun\Java\Deployment\cache\6.0\63\3246f93f-12015100 a variant of Java/TrojanDownloader.Agent.NAA trojan deleted - quarantined

In addition to the above, I am also attaching my latest Infection log from my online protection software so that it may assist you further.
Thanks

Attached Files


Edited by phoenix85, 22 March 2010 - 12:12 AM.


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 22 March 2010 - 01:10 PM

Not as bad as you fear, phoenix85. These are just remnants and are just the trace of what was there.

The system restore is just a copy of the virus. It will be removed at the end of the fix.

The Java cache entry is also just a copy. We would have removed everything there at the end as well.

Even the registry entry is just a leftover.

I'd like to see a different online scanner log just to clear up as much as there is. Please run this with Internet Explorer.

Please run a BitDefender Online Scan
  • Click I Agree to agree to the EULA.
  • Allow the ActiveX control to install when prompted.
  • Click Click here to scan to begin the scan.
  • Please refrain from using the computer until the scan is finished. This might take a while to run, but it is important that nothing else is running while you scan.
  • When the scan is finished, click on Click here to export the scan results.
  • Save the report to your desktop so you can post it in your next reply.

Posted Image
m0le is a proud member of UNITE

#11 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 22 March 2010 - 09:00 PM

Hey,

I just finished running BitDefender online scanner and I'm happy to report that it
did not find any viruses. And no threat detection from my real-time protection software.

It looks like my laptop is clean now but I'm still doubtful.
I've attached the report below.

Attached Files



#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 23 March 2010 - 04:06 AM

QUOTE(phoenix85 @ Mar 23 2010, 02:00 AM) View Post
It looks like my laptop is clean now but I'm still doubtful.


Understandable seeing that TDSS has been here - it makes people paranoid. The truth is that you are clean, any sign of TDSS would have come up under the Combofix log.

There is a program which has a readable log which checks for TDSS' calling card which is infection of specific system files. Each file is checked and Verdict: Clean is what we are looking for. its output should allay your fears.
  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to leave the file alone
    .
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here (or attach it).

Posted Image
m0le is a proud member of UNITE

#13 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 23 March 2010 - 05:53 PM

Hi mole,

Thanks for the heads up.
Two things to clarify:

1) Can I safely delete the quarantined file mentioned earlier?

C:\System Volume Information\_restore{38B4D61C-C07A-4C02-96D0-58C678D49ACB}\RP247\A0061651.exe
Packed.Win32.Krap.as
Quarantined
21/03/2010 8:51:19 PM

2) I see some folders in C:\ drive like Found 000,001,002 and config.msi
When I googled, these were supposedly hidden system files by default. Not so in my system.
Could the infection have modified these files?

Other than these, my laptop seems to be infection free and the TDSS application came out just fine.

Here's the log:

18:34:59:531 3156 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04
18:34:59:531 3156 ================================================================================
18:34:59:531 3156 SystemInfo:

18:34:59:531 3156 OS Version: 5.1.2600 ServicePack: 3.0
18:34:59:531 3156 Product type: Workstation
18:34:59:531 3156 ComputerName: ACERMATE
18:34:59:531 3156 UserName: Twinkle
18:34:59:531 3156 Windows directory: C:\WINDOWS
18:34:59:531 3156 Processor architecture: Intel x86
18:34:59:531 3156 Number of processors: 1
18:34:59:531 3156 Page size: 0x1000
18:34:59:578 3156 Boot type: Normal boot
18:34:59:578 3156 ================================================================================
18:34:59:921 3156 UnloadDriverW: NtUnloadDriver error 2
18:34:59:921 3156 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
18:35:01:156 3156 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
18:35:01:156 3156 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:35:01:156 3156 wfopen_ex: Trying to KLMD file open
18:35:01:156 3156 wfopen_ex: File opened ok (Flags 2)
18:35:01:156 3156 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
18:35:01:156 3156 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:35:01:156 3156 wfopen_ex: Trying to KLMD file open
18:35:01:156 3156 wfopen_ex: File opened ok (Flags 2)
18:35:01:156 3156 Initialize success
18:35:01:156 3156
18:35:01:156 3156 Scanning Services ...
18:35:03:640 3156 Raw services enum returned 356 services
18:35:03:703 3156
18:35:03:703 3156 Scanning Kernel memory ...
18:35:03:703 3156 Devices to scan: 4
18:35:03:703 3156
18:35:03:703 3156 Driver Name: Disk
18:35:03:703 3156 IRP_MJ_CREATE : F86FBBB0
18:35:03:703 3156 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
18:35:03:703 3156 IRP_MJ_CLOSE : F86FBBB0
18:35:03:703 3156 IRP_MJ_READ : F86F5D1F
18:35:03:703 3156 IRP_MJ_WRITE : F86F5D1F
18:35:03:703 3156 IRP_MJ_QUERY_INFORMATION : 804F355A
18:35:03:703 3156 IRP_MJ_SET_INFORMATION : 804F355A
18:35:03:703 3156 IRP_MJ_QUERY_EA : 804F355A
18:35:03:703 3156 IRP_MJ_SET_EA : 804F355A
18:35:03:703 3156 IRP_MJ_FLUSH_BUFFERS : F86F62E2
18:35:03:703 3156 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
18:35:03:703 3156 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
18:35:03:703 3156 IRP_MJ_DIRECTORY_CONTROL : 804F355A
18:35:03:703 3156 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
18:35:03:703 3156 IRP_MJ_DEVICE_CONTROL : F86F63BB
18:35:03:703 3156 IRP_MJ_INTERNAL_DEVICE_CONTROL : F86F9F28
18:35:03:703 3156 IRP_MJ_SHUTDOWN : F86F62E2
18:35:03:703 3156 IRP_MJ_LOCK_CONTROL : 804F355A
18:35:03:703 3156 IRP_MJ_CLEANUP : 804F355A
18:35:03:703 3156 IRP_MJ_CREATE_MAILSLOT : 804F355A
18:35:03:703 3156 IRP_MJ_QUERY_SECURITY : 804F355A
18:35:03:703 3156 IRP_MJ_SET_SECURITY : 804F355A
18:35:03:703 3156 IRP_MJ_POWER : F86F7C82
18:35:03:703 3156 IRP_MJ_SYSTEM_CONTROL : F86FC99E
18:35:03:703 3156 IRP_MJ_DEVICE_CHANGE : 804F355A
18:35:03:703 3156 IRP_MJ_QUERY_QUOTA : 804F355A
18:35:03:703 3156 IRP_MJ_SET_QUOTA : 804F355A
18:35:03:734 3156 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:35:03:734 3156
18:35:03:734 3156 Driver Name: Disk
18:35:03:734 3156 IRP_MJ_CREATE : F86FBBB0
18:35:03:734 3156 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
18:35:03:734 3156 IRP_MJ_CLOSE : F86FBBB0
18:35:03:734 3156 IRP_MJ_READ : F86F5D1F
18:35:03:734 3156 IRP_MJ_WRITE : F86F5D1F
18:35:03:734 3156 IRP_MJ_QUERY_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_SET_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_EA : 804F355A
18:35:03:734 3156 IRP_MJ_SET_EA : 804F355A
18:35:03:734 3156 IRP_MJ_FLUSH_BUFFERS : F86F62E2
18:35:03:734 3156 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_DIRECTORY_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_DEVICE_CONTROL : F86F63BB
18:35:03:734 3156 IRP_MJ_INTERNAL_DEVICE_CONTROL : F86F9F28
18:35:03:734 3156 IRP_MJ_SHUTDOWN : F86F62E2
18:35:03:734 3156 IRP_MJ_LOCK_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_CLEANUP : 804F355A
18:35:03:734 3156 IRP_MJ_CREATE_MAILSLOT : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_SECURITY : 804F355A
18:35:03:734 3156 IRP_MJ_SET_SECURITY : 804F355A
18:35:03:734 3156 IRP_MJ_POWER : F86F7C82
18:35:03:734 3156 IRP_MJ_SYSTEM_CONTROL : F86FC99E
18:35:03:734 3156 IRP_MJ_DEVICE_CHANGE : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_QUOTA : 804F355A
18:35:03:734 3156 IRP_MJ_SET_QUOTA : 804F355A
18:35:03:734 3156 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:35:03:734 3156
18:35:03:734 3156 Driver Name: Disk
18:35:03:734 3156 IRP_MJ_CREATE : F86FBBB0
18:35:03:734 3156 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
18:35:03:734 3156 IRP_MJ_CLOSE : F86FBBB0
18:35:03:734 3156 IRP_MJ_READ : F86F5D1F
18:35:03:734 3156 IRP_MJ_WRITE : F86F5D1F
18:35:03:734 3156 IRP_MJ_QUERY_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_SET_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_EA : 804F355A
18:35:03:734 3156 IRP_MJ_SET_EA : 804F355A
18:35:03:734 3156 IRP_MJ_FLUSH_BUFFERS : F86F62E2
18:35:03:734 3156 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
18:35:03:734 3156 IRP_MJ_DIRECTORY_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_DEVICE_CONTROL : F86F63BB
18:35:03:734 3156 IRP_MJ_INTERNAL_DEVICE_CONTROL : F86F9F28
18:35:03:734 3156 IRP_MJ_SHUTDOWN : F86F62E2
18:35:03:734 3156 IRP_MJ_LOCK_CONTROL : 804F355A
18:35:03:734 3156 IRP_MJ_CLEANUP : 804F355A
18:35:03:734 3156 IRP_MJ_CREATE_MAILSLOT : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_SECURITY : 804F355A
18:35:03:734 3156 IRP_MJ_SET_SECURITY : 804F355A
18:35:03:734 3156 IRP_MJ_POWER : F86F7C82
18:35:03:734 3156 IRP_MJ_SYSTEM_CONTROL : F86FC99E
18:35:03:734 3156 IRP_MJ_DEVICE_CHANGE : 804F355A
18:35:03:734 3156 IRP_MJ_QUERY_QUOTA : 804F355A
18:35:03:734 3156 IRP_MJ_SET_QUOTA : 804F355A
18:35:03:750 3156 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:35:03:750 3156
18:35:03:750 3156 Driver Name: atapi
18:35:03:750 3156 IRP_MJ_CREATE : F846C6F2
18:35:03:750 3156 IRP_MJ_CREATE_NAMED_PIPE : 804F355A
18:35:03:750 3156 IRP_MJ_CLOSE : F846C6F2
18:35:03:750 3156 IRP_MJ_READ : 804F355A
18:35:03:750 3156 IRP_MJ_WRITE : 804F355A
18:35:03:750 3156 IRP_MJ_QUERY_INFORMATION : 804F355A
18:35:03:750 3156 IRP_MJ_SET_INFORMATION : 804F355A
18:35:03:750 3156 IRP_MJ_QUERY_EA : 804F355A
18:35:03:750 3156 IRP_MJ_SET_EA : 804F355A
18:35:03:750 3156 IRP_MJ_FLUSH_BUFFERS : 804F355A
18:35:03:750 3156 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F355A
18:35:03:750 3156 IRP_MJ_SET_VOLUME_INFORMATION : 804F355A
18:35:03:750 3156 IRP_MJ_DIRECTORY_CONTROL : 804F355A
18:35:03:750 3156 IRP_MJ_FILE_SYSTEM_CONTROL : 804F355A
18:35:03:750 3156 IRP_MJ_DEVICE_CONTROL : F846C712
18:35:03:750 3156 IRP_MJ_INTERNAL_DEVICE_CONTROL : F8468852
18:35:03:750 3156 IRP_MJ_SHUTDOWN : 804F355A
18:35:03:750 3156 IRP_MJ_LOCK_CONTROL : 804F355A
18:35:03:750 3156 IRP_MJ_CLEANUP : 804F355A
18:35:03:750 3156 IRP_MJ_CREATE_MAILSLOT : 804F355A
18:35:03:750 3156 IRP_MJ_QUERY_SECURITY : 804F355A
18:35:03:750 3156 IRP_MJ_SET_SECURITY : 804F355A
18:35:03:750 3156 IRP_MJ_POWER : F846C73C
18:35:03:750 3156 IRP_MJ_SYSTEM_CONTROL : F8473336
18:35:03:750 3156 IRP_MJ_DEVICE_CHANGE : 804F355A
18:35:03:750 3156 IRP_MJ_QUERY_QUOTA : 804F355A
18:35:03:750 3156 IRP_MJ_SET_QUOTA : 804F355A
18:35:03:796 3156 C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: 1
18:35:03:796 3156
18:35:03:796 3156 Completed
18:35:03:796 3156
18:35:03:796 3156 Results:
18:35:03:796 3156 Memory objects infected / cured / cured on reboot: 0 / 0 / 0
18:35:03:796 3156 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
18:35:03:796 3156 File objects infected / cured / cured on reboot: 0 / 0 / 0
18:35:03:796 3156
18:35:03:796 3156 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
18:35:03:796 3156 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
18:35:03:812 3156 KLMD(ARK) unloaded successfully


#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:46 AM

Posted 23 March 2010 - 06:20 PM

Yep, thought it would. Always good to make sure.

QUOTE
1) Can I safely delete the quarantined file mentioned earlier?

C:\System Volume Information\_restore{38B4D61C-C07A-4C02-96D0-58C678D49ACB}\RP247\A0061651.exe
Packed.Win32.Krap.as
Quarantined
21/03/2010 8:51:19 PM


Yes you can.

QUOTE
2) I see some folders in C:\ drive like Found 000,001,002 and config.msi
When I googled, these were supposedly hidden system files by default. Not so in my system.
Could the infection have modified these files?


No, the FOUND files are legitimate Microsoft files.

These folders are created automatically when we run the chkdsk scan or possibly another disk checking utility. When errors are found such as lost clusters on your drive, Windows will fix the errors but depending on whether or not you have chosen to convert lost clusters or chains to file, windows will create these folders sequentially starting with .000. So you may have several of them.

The folders contain files with names File0000.chk, File 0001.chk and so on. These file are created to save any lost data during the chkdsk fix.

But usually these files are of no use and you can delete them at your will. I usually delete them if I find them during a fix.


And with that...

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it phoenix85, happy surfing!

Cheers.

m0le


Posted Image
m0le is a proud member of UNITE

#15 phoenix85

phoenix85
  • Topic Starter

  • Members
  • 81 posts
  • OFFLINE
  •  
  • Local time:01:46 AM

Posted 25 March 2010 - 07:51 PM

Hi there mate,

Just wanted to thank you for your professional help.
thumbup2.gif All is well with my PC so far..





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users